It lets companies and individuals track the use and abuse of PCs easily and invisibly using password-protected encrypted log files.

This application monitors and logs keystrokes, user names, passwords, path names, access times, window titles and visited Web sites. The encrypted log file can be converted to plain text, HTML or spreadsheet format. In stealth mode, it doesn't show up in the system tray, task bar or task list and provides for remote surveillance of networked PCs connected to the Internet. It can also send the log file to another PC using a standard SMTP or POP3 e-mail account.

This also includes Chat Spy logs to monitor both sides of a chat conversation for all major chat clients including AOL Instant Messenger, MS Messenger, ICQ and Yahoo.